iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ users
جزئیات خدمات ترجمه در ترجمه تخصصی
[]
spectrum
Twitter
Twitter
ctd
security
ctd
ctd
ctd
ctd
spectrum
ctd
ctd
channel
mobile
mcommerce
Irexporterscom
information
information
user
user
system
system
system
system
data
t
gerprinting
ngerprinting
model
model
decision
social
Available online at www.sciencedirect.com
Anyone who is responsible for a private network that is
Available online at www.sciencedirect.com
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
INTRUSION
INTRUSION
INTRUSION
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
2012 Proceedings IEEE INFOCOM
CHAPTER 1
ISSN: 2277-3754
ISSN: 2277-3754
Secure Storage in Cloud Computing & Emergence
روشهای موثر بازاریابی در شبکه های اجتماعی METHODS AND SYSTEMS
روشهای موثر بازاریابی در شبکه های اجتماعی METHODS AND SYSTEMS
روشهای موثر بازاریابی PART1
METHODS AND SYSTEMS FOR TRACKING OF USER INTERACTIONS WITH CONTENT
METHODS AND SYSTEMS FOR TRACKING OF USER INTERACTIONS
The NSA is Watching You Leaked NSA source code from
The NSA is Watching You Leaked NSA source code from
s patent application shows how the smart lock system could
Defining your beachhead market and End User Profile provides you
It is critically important that you recognize that to be
It is critically important that you recognize that to be
This technology uses both the internet and the central servers
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
KEY CONCEPTS The main concepts dealing in this paper are
the current cloud computing only has a process that responds
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
the current cloud computing only has a process that responds
This page intentionally left blank Behavior Dynamics in Media-Sharing Social Networks
Expert Systems with Applications 39 (2012) 12001–12013
2010 Ninth International Conference on Mobile Business / 2010 Ninth Global Mobility Roundtable 2010 Ninth International Conference on Mobile Business / 2010 Ninth Global Mobility Roundtable
Coding Techniques
Coding Techniques
Coding Techniques
Coding Techniques
INTRUSION
INTRUSION
Recommending People to Invite into Your Social Network ABSTRACT In
A Guide to ERP: Benefits,
THE ELEMENTS OF
Travi-Navi: Self-deployableIndoorNavigationSystem
1. Introduction
Expert Systems with Applications 40 (2013) 1240–1247
commerce is still growing and many new applications are constantly
re trying to find unless you manhandle it out of
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Electrical Information and Communication Technology (EICT)
Scheduling problems for cloud computing
Wireless Pers Commun (2014) 74:585–599
Business Horizons (2011) 54, 509—514
Business Horizons (2011) 54, 509—514
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
INFORMATION SECURITY
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
INFORMATION SECURITY
Discovering the influential users oriented to viral marketing
WhydoNigerianScammersSayTheyarefromNigeria?
Sky Journal of Educational Research
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Perceived ease of use Perceived ease of use is defined
2012 Ninth International Conference on Information Technology - New Generations 2012 Ninth International Conference on Information Technology- New Generations
We do not mean to suggest that there are no
Available online at www.sciencedirect.com
system allows a center to send encrypted messages over a
system allows a center to send encrypted messages over a
Available online at www.sciencedirect.com
Social Media ABSTRACT
Comparison of Several Cloud Computing Platforms
2012 Second International Conference on Cloud and Green Computing
This paper proposed a Visual Exploratory Search Engine solution based
2012 Second International Conference on Cloud and Green Computing
2012 Second International Conference on Cloud and Green Computing
This paper proposed a Visual Exploratory Search Engine solution based
This paper proposed a Visual Exploratory Search Engine solution based
This paper proposed a Visual Exploratory Search Engine solution based
We do not mean to suggest that there are no
We do not mean to suggest that there are no
Tourism Management 47 (2015) 79e87
Tourism Management 47 (2015) 79e87
Comparison of Several Cloud Computing Platforms
Scientific advances have often created technological linkages among formerly distinct
DECSUP-12148; No of Pages 13
Knowledge-Based Systems 37 (2013) 146–153
A flexible framework for context-aware recommendations
With an explosive growth of the mobile applications and emerging
Mobile photo sharingservice enables mobile users to upload images
Accepted in Wireless Communications and Mobile Computing - Wiley
is a type of cyber attack with the intention to
is a type of cyber attack with the intention to
HindawiPublishingCorporation
Developing Adaptable, Efficient Mobile Library Services: Librarians as Enablers
Cooperation for Innovation 113
2013 International Conference on Electrical Information and Communication Technology (EICT)
Microsoft offers a competitive and expanding set of BI and
Over the past centuries, technologies have
2010 Second International Conference on Future Networks
Pa r t
Chapter
Business Horizons (2011) 54, 241—251
The Home Needs an Operating System (and an App Store)
only the best features to optimize your contents Focus on
Business Horizons (2007) 50, 315–324
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
3/29/2015 cPanel X - MySQL Databases
Command Execution
English for IT and Software Engineering H.A.Kiasari-2013
Business Horizons (2011) 54, 241—251
WEN LAYOUT.qxp_Layout 1 1/16/15 2:50 PM Page 35
Rev. Confirming Pages
Modeling Work Distribution Mechanisms Using Colored
Business Horizons (2007) 50, 315–324
Systems56(2013)361–370
Business Horizons (2007) 50, 315–324
2012 IEEE Symposium on Robotics and Applications(ISRA)
Wireless Netw
JournalofBusinessResearch68(2015)878–882
THE 7 SOCIAL MEDIA TRENDS DOMINATING 2015 A recent study
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
NUMERO 2 - giugno 2011 ISSN 2036 1602
Search Engine Optimization
Culture-orientated Product Design
Nakhei
2 art
1)Researcher Bypasses Google Password Alert For Second Time A security researcher has developed a method–actually two methods–for defeating the new Chrome Password Alert extension that Google released earlier this week.
Wireless Netw
DATA WAREHOUSING
Computers in Human Behavior 35 (2014) 464–478
DATA WAREHOUSING
CHAPTER 5
CHAPTER 5
CHAPTER 5
CHAPTER 5
CHAPTER 5
CHAPTER 4
56 The International Journal of Digital Accounting Research 57
ThinkPiece
I was able to set up a fortress that he
I was able to set up a fortress that he
CRM
System Architecture The system architecture vaguely shows how any honeypot
REVIEW OF ACCESS CONTROL MODELS FOR
CHAPTER 6
Countermeasures Encourage users to be aware of their surroundings and
Countermeasures Encourage users to be aware of their surroundings and
Investigating the Customer Satisfaction of the Bus Service in Qatar
Investigating the Customer Satisfaction of the Bus Service in Qatar
Master’s thesis
DecisionSupportSystems74(2015)12–32
3. An architecture for Context-Aware Fuzzy Databases
3. An architecture for Context-Aware Fuzzy Databases
ISSN 0147 6882, Scientific and Technical In formation Processing, 2012, Vol. 39, No. 3, pp. 173–178. © Allerton Press, Inc., 2012.
weHelp: AReferenceArchitectureforSocialRecommender
weHelp: AReferenceArchitectureforSocialRecommender
6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United
WhereItCameFromandWhatItIs The World Wide Web is an Internet facility that
DecisionSupportSystems74(2015)12–32
Applying Text Analytics to Social Media It presents great challenges
Applying Text Analytics to Social Media It presents great challenges
Applying Text Analytics to Social Media It presents great challenges
Applying Text Analytics to Social Media It presents great challenges
Applying Text Analytics to Social Media It presents great challenges
Join NursingCenter to get uninterrupted access to this article and
Considerations for a Successful Clinical Decision Support System Abstract Clinical
Considerations for a Successful Clinical Decision Support System Abstract Clinical
Avoiding Simple Design Mistakes
1 Cover design: Dominik Pacholczyk
Jurnal Kemanusiaan bil.11, Jun 2008
Jurnal Kemanusiaan bil.11, Jun 2008
UDC 621.398: 681.3
The relationship between the factors influencing the quality of websites on a
Wireless Netw (2014) 20:1295–1311
Wireless Netw (2011) 17:1441–1459
Mobile WiMAX Resource Allocation Design Goals:
letting users send direct messages as long as they like
ISSN (Print) : 2320 – 3765
TFS-18147;NoofPages10
A Seminar Report on
A Seminar Report on
The Web has become a more social environment since its
The Web has become a more social environment since its
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Available online at www.sciencedirect.com
Predicting individual retweet behavior by user similarity: A multi-task
KNOSYS 3269 No. of Pages 8, Model 5G
KNOSYS 3269 No. of Pages 8, Model 5G
KNOSYS 3269 No. of Pages 8, Model 5G
This article was downloaded by: [Memorial University of Newfoundland]
This article was downloaded by: [Memorial University of Newfoundland]
Dubai taxis to increase by 34 per cent by 2020
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
Generating brand awareness in Online Social Networks
3.1.2. The impact of rewards on brand
Hikvision is determined to make CCTV surveillance easier and quicker
Editors: Frédéric Thiesse • frederic.thiesse@unisg.ch
that was to change the face of commercial computing profoundly
Building the Internet
Building the Internet
WhatisTumblr: AStatisticalOverviewandComparison
Big Data Processing Using Hadoop: Survey on
Globecom 2012 - Communication Theory Symposium
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.16,NO.4,FOURTH QUARTER 2014 1801
Available online at www.sciencedirect.com
IFAC Board
Information Systems 37 (2012) 61–76
Perceived enjoyment
Optics Communications 339 (2015) 153–156
Optics Communications 339 (2015) 153–156
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
2014 IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications
computers & security 52 (2015) 128e141
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Journal of Business Research 55 (2002) 293–299
examining ways ofPreserving privacy in social networks SECURITY AND PRIVACY
let alone the global network community or the billions of
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
ARTICLE IN PRESS
CHAPTER 5
php
"ACCESS ERROR";
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.16,NO.4,FOURTH QUARTER 2014 1801
ZHANG_LAYOUT_Layout 1 7/17/14 2:26 PM Page 74
International Journal of Information Management 35 (2015) 551–560
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
users are only willing to accept innovations if those innovations
upsurges the capabilities of the hardware resources by optimal and
s Edge keeps shedding share as users pick other browsers
"ACCESS ERROR";
"ACCESS ERROR";
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
5 Reasons Libraries Are Ready For Innovation In less than
Design of a Trusted File System Based on Hadoop
Kerberos can be connected to corporate LDAPenvironments to centrally provision
it ensures the reliability and safety from the three levels
امنیت هادوپ
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
survey security of hadoop
Design of a Trusted File System Based on Hadoop
A middle layer solution to support ACID properties for NoSQL
Chapter 15
Corporate Portals Empowered with XML and Web Services
Reputation Reputation of a company is also crucial in online
Reputation Reputation of a company is also crucial in online
TSplus White Paper
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
SIGNS, CODES AND COMMUNICATION:
TRAGEDY OF THE COMMONSWhen there is a commonly shared
An important assumption of this work is that the existing
Accepted Manuscript
2010 2nd International Conference on Software Technology and Engineering(ICSTE)
2014 IEEE 15th International Conference on Mobile Data Management
2014 IEEE 15th International Conference on Mobile Data Management
the Internet is often used forcommunication and social purposes
MD DALIM 1011736 3/25/09 CYAN MAG YELO BLACK
International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)
The Journal of Systems and Software 99 (2015) 109–119
The Journal of Systems and Software 99 (2015) 109–119
20 The story of mobile broadband is very much an
pictures and videos thereby providing a deep insight into a
Review of the LiteratureThis review considers background literature from
Managing Project Risk Change management Required for successful system building
Managing Project Risk Change management Required for successful system building
The Journal of China
FANG LAYOUT 7/8/10 12:10 PM Page 13
14.2.2 Time-Division
cloud computing
Accepted Manuscript
Accepted Manuscript
FriendshipPredictionandHomophilyinSocialMedia
Accessibility Testing the Colours of Your Website Web accessibility is
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
Network-Based Modeling and Intelligent Data
Online Social Network
Security
Privacy
Journal of Hydrology 518 (2014) 83–93
Available online at www.sciencedirect.com
Augmented reality Samsung SARI AR SDK marker less tracker used
Market Segmentation Supports market understanding and is a critical input
Market Segmentation Supports market understanding and is a critical input
Market Segmentation Supports market understanding and is a critical input
Based Modeling and Intelligent Data Mining of Social Media for
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
Based Modeling and Intelligent Data Mining of Social Media for
210 IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO. 1, JANUARY 2015
1. INTRODUCTION
Data Security Challenges and Its Solutions in Cloud Computing
پژوهش در مطالعات رسانه
78 4 Marketing Communications in Social Media
is Assistant Professor at the School of Communication of the
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
and orthogonal CDMA all have the same theoretical capacity in
and orthogonal CDMA all have the same theoretical capacity in
to the channel before transmitting in order to avoid collisions
An improvement upon static allocation made possible in LTE is
It should be noted that uplink OFDMA is considerably more
1 Multiuser Diversity The main motivation for adaptive subcarrier allocation
the base station must inform each user which subcarriers have
The PF scheduler is designed to take advantage of multiuser
we consider the multiuser diversity gains of the different types
we consider the multiuser diversity gains of the different types
describes any cloud service where consumers are able to access
describes any cloud service where consumers are able to access
The first screen is that initial glimpse that a user
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
584 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592 585
586 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Available online at www.sciencedirect.com
588 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
588 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
This will result in a parallelization of the real and
6.2 Development of the Internet from the Users’ Perspective 41
6.2 Development of the Internet from the Users’ Perspective 41
10 Guidelines For Navigation Usability - Usabilit…
http://www.bankinfosecurity.com/
the initial introduction found that 83% preferred voice verification over the 5 digit
In almost every case, the majority of visitors to a financial website are current
With the financial Web experience shifting from consumers checking balances to other
inShare9 Share on Tumblr There was so much to see
This article has been accepted for publication in a future
شبکه های هوشمند
های نوین در مدیریت شهری هوشمند به ابزاری مهم برای
شبکه های هوشمند
our goal is to help users quickly find the best
WWW 2009 MADRID! Track: Internet Monetization / Session: Web Monetization
Computers in Human Behavior 64 (2016) 217e225
The Roles of Marketing and Industrial Design inDiscontinuous New Product
materialise Plugin Gives Onshape Users Direct Access to 3D Printing
Knowledge-Based Systems 46 (2013) 109–132
5 Key Facts about SaaS Market Size Posted by OmriErel
UnderstandingBehaviorsthatLeadtoPurchasing:
A Modern Addiction Some Internet users may develop an emotionalattachment
International Journal of Science and Research (IJSR)
Mobile Netw Appl
ACALIB-01566;No.ofpages:10;4C:
ACALIB-01566;No.ofpages:10;4C:
star network topology to enhance the system capacity abstract In
star network topology to enhance the system capacityIn this
star network topology to enhance the system capacity In this
Available online at www.sciencedirect.com
Computers in Human Behavior 29 (2013) 2722–2729
3D Modeling For those just beginning to try their hand
Available online at www.sciencedirect.com
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 7 152
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 1, JANUARY 2014 ISSN 2277-8616
ARTICLE IN PRESS
Link Prediction in Multi-modal Social Networks
Accepted Manuscript
One is to determine the users of a specific domain
t
25. begin
The algorithm tries to build a domain-aware UTN according to the time-varying hypergraph and user trust
The algorithm tries to build a domain-aware UTN according to the time-varying hypergraph and user trust
EuropeanJournal ofOperationalResearch 242(2015) 274–285
By/ Eng. Ahmed Nasser Ahmed
Facebook Distributed System Case Study For Distributed System Inside Facebook
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
1 The Internet technology has certainly revolutionized the world of
1 The Internet technology has certainly revolutionized the world of
Social media is a virtual landscape that facilitates quick and
This Article is concerned with gender discrimination as an interference
The tremendous increase in the popularity of the SNS allows
Journal of Network and Computer Applications 52 (2015) 79–89
Information Sciences 191 (2012) 128–145
The Google Generation CHANDOS
Security, Privacy and Trust in Cloud Computing:
computer law & security review 31 (2015) 351e364
The Google Generation CHANDOS
H. Koohi, K. Kiani/Measurement 91 (2016) 134–139 135
IEEE ANTS 2015 1570205805
Mobile Marketing › Location and mobile Mobile Marketing › Location and mobile
Edited with the trial version of
The “NVCA Tool for Managing New Urban Development in Phosphorus-Sensitive
University of Windsor
Expert Systems With Applications 56 (2016) 9–27
Expert Systems With Applications 56 (2016) 9–27
9 Tools to Improve Your Instagram Marketing From Our Partners
9 Tools to Improve Your Instagram Marketing From Our Partners
Five Fantastic Editorial Calendars For Content Makers By Joshua Kraus
sharing app and social network created in 2010 by founders
9 Tools to Improve Your Instagram Marketing From Our Partners
Five Fantastic Editorial Calendars For Content Makers By Joshua Kraus
9 Tools to Improve Your Instagram Marketing From Our Partners
Five Fantastic Editorial Calendars For Content Makers By Joshua Kraus
Five Fantastic Editorial Calendars For Content Makers By Joshua Kraus
sharing app and social network created in 2010 by founders
9 Tools to Improve Your Instagram Marketing From Our Partners
3 Ways to Use Instagram Live for Business By Sara
Downloaded from http://iranpaper.ir
1
> SO_SWSI-2015-06-0088 - ACCEPTED TO IEEE SOFTWARE SI - FUTURE OF SOFTWARE ENGINEERING, 2015 < 1
Abstract-Under the environment of smart grid, residential
Abstract-Under the environment of smart grid, residential
Abstract-Under the environment of smart grid, residential
A Novel Model for Home Energy Management System Based on Internet of Things
Aware Personalized User Recommendations in Social Networks Abstract Trust is
What’s Up CAPTCHA?
What’s Up CAPTCHA?
The Presentation Effect on Graphical Passwords
Professional Edition vs.
Downloaded from http://iranpaper.ir
Edith Cowan University
Edith Cowan University
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
6 M. P. Peris-Ortiz et al.
6 SOCIAL COMMERCE TRENDS YOU ABSOLUTELY MUST KNOW Just a
commerce contender thanks to its extremely effective hypertargeting options in
SPECIALSECTIONONSOCIALLYENABLEDNETWORKINGANDCOMPUTING
Abstract
Authorship and Copyright in Social Media
not only as observed subjects but also as a source
GUIZANI_LAYOUT.qxp_Author Layout 2/17/15 4:16 PM Page 138
Information Systems
4 Understanding Information Retrieval Systems
32 Understanding Information Retrieval Systems
Information Searching and Search Models 37
the e-commerce system, usability studies have largely addressed
the e-commerce system, usability studies have largely addressed
the e-commerce system, usability studies have largely addressed
From e-commerce to social commerce: A close look at design features the e-commerce system, usability studies have largely addressed
From e-commerce to social commerce: A close look at design features the e-commerce system, usability studies have largely addressed
From e-commerce to social commerce: A close look at design features the e-commerce system, usability studies have largely addressed
Computers in Human Behavior 55 (2016) 51e61
4 Reasons Why Blogging is Important for Your Business There
4 Reasons Why Blogging is Important for Your Business There
JournalofBusinessResearch68(2015)777–782
impact bugs are bugs that have high impact on developers
The score for a bonus question will be added to
secures organizations with its wide range of product offerings at
Decision Support Systems 47 (2009) 60–71
Sony Xperia XZ1 users can order 3D prints directly with smartphone scanning app
Search Engine Optimization
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
based Models Analyzing the propagation behavior is popular but incurs
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
DECSUP-12342; No of Pages 8
DECSUP-12342; No of Pages 8
3802 S. Ghazarian, M.A. Nematbakhsh/Expert Systems with Applications 42 (2015) 3801–3812
International Journal of Information Management 38 (2018) 7–26
DECSUP-12342; No of Pages 8
Received 20 January 2012 Received in revised form 28 November
Received 20 January 2012 Received in revised form 28 November
Distributed Group Decision Support Systems Our approach to solving decision
Leveraging Social Network Sites for New Product Launch Abstract Purpose
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Accepted Manuscript
TECHNOLOGY TRANSFER Winter-Spring 1990 5
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. 2, SECOND QUARTER 2017 721
is growing every day because of their reliability and great
is growing every day because of their reliability and great
Measurement 91 (2016) 134–139
WISER User's Guide
Accepted Manuscript
we consider the privacy of SCNINR schemes in a network
we consider the privacy of SCNINR schemes in a network
we consider the privacy of SCNINR schemes in a network
AppCoins
کامپیوتر
Voice information systems The appeal of the human voice as
International Journal of
4
5
ACCEPTED MANUSCRIPT
Highlights
Appendix A: Logging in—A Brief Note
Appendix A: Logging in—A Brief Note
1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JLT.2015.2510021, Journal of
A one column layout will give you more control over
A one column layout will give you more control over
A one column layout will give you more control over
Recommender System Application Developments: A Survey
A major undertaking of the fasb has been the development
A major undertaking of the fasb has been the development
Journal of Business Research xxx (xxxx) xxx–xxx
Journal of Business Research xxx (xxxx) xxx–xxx
2856 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
2858 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
MADDAH-ALI AND NIESEN: FUNDAMENTAL LIMITS OF CACHING 2859
MADDAH-ALI AND NIESEN: FUNDAMENTAL LIMITS OF CACHING 2861
MADDAH-ALI AND NIESEN: FUNDAMENTAL LIMITS OF CACHING 2865
This chapter will focus on infections that occur as a
Data Leakage Prevention
5004-2
A survey of real locomotion techniques for immersive virtual reality applications on head-mounted displays
You may use shortcodes to customize the display of your
Research Issues and Challenges in Content Placementand Delivery Strategies Abstract
Web-Scale Workflow
Kim Falk
st
User Centered Design Methods
UCD - User-Centered Design
io Counos Platform list contents of 2 3 5 6
io Counos Platform list contents of 2 3 5 6
distributed platform of servers that helps minimize delays in loading
attack What is MITM attack A man in the middle
Sci Eng Ethics (2018) 24:905–925
Sci Eng Ethics (2018) 24:905–925
Current Challenges in Social Media Management ABSTRACT Social media management
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2672680, IEEE Access
Analysis of OnlineSocial Network Connections for
Accepted Manuscript
Accepted Manuscript
Abstract
New Product Development During the Last Ten Years:
s developing as part of the plan to depreciate support
Downloaded from https://iranpaper.ir
3
Securing the edge with Zero Trust The proliferation of cloud
Downloaded from https://iranpaper.ir
Scareware is a malware tactic that manipulates users into believing
is the process of restricting unauthorized users and devices from
you ensure that connection attempts provide two or more pieces
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/339561073
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/339561073
is an authentication method that lets users access multiple applications
is an authentication method that lets users access multiple applications
Information and Computation 146, 1�23 (1998)
Knowledge-Based Systems 46 (2013) 109–132
5 User Experience Horror Stories
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2016.2572203, IEEE
A Survey on Vehicular Fog Computing:
Expert Systems With Applications 139 (2020) 112839
Expert Systems With Applications 139 (2020) 112839
International Journal of Information Management Data Insights 1 (2021) 100028
International Journal of Information Management Data Insights 1 (2021) 100028
Downloaded from https://iranpaper.ir
ESWA 9318 No. of Pages 10, Model 5G
AI & SOCIETY (2023) 38:1627–1638